Omid Setayeshfar
Omid Setayeshfar
Research Scientist @Meta
Verified email at
Cited by
Cited by
When push comes to ads: Measuring the rise of (malicious) push advertising
K Subramani, X Yuan, O Setayeshfar, P Vadrevu, KH Lee, R Perdisci
Proceedings of the ACM Internet Measurement Conference, 724-737, 2020
Graalf: Supporting graphical analysis of audit logs for forensics
O Setayeshfar, C Adkins, M Jones, KH Lee, P Doshi
Software Impacts 8, 100068, 2021
Droidforensics: Accurate reconstruction of android attacks via multi-layer forensic logging
X Yuan, O Setayeshfar, H Yan, P Panage, X Wei, KH Lee
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
Spatio-temporal coverage enhancement in drive-by sensing through utility-aware mobile agent selection
NH Tonekaboni, L Ramaswamy, D Mishra, O Setayeshfar, S Omidvar
Internet of Things-ICIOT 2020: 5th International Conference, Held as Part of …, 2020
A novel AI-based methodology for identifying cyber attacks in honey pots
M AbuOdeh, C Adkins, O Setayeshfar, P Doshi, KH Lee
Proceedings of the AAAI Conference on Artificial Intelligence 35 (17), 15224 …, 2021
ChatterHub: Privacy Invasion via Smart Home Hub
O Setayeshfar, K Subramani, X Yuan, R Dey, D Hong, KH Lee, IK Kim
2021 IEEE International Conference on Smart Computing (SMARTCOMP), 181-188, 2021
Path-based program lineage inference analysis
J Rhee, Z Wu, L Korts-Parn, K Jee, LI Zhichun, O Setayeshfar
US Patent 10,853,487, 2020
Cyber attack intent recognition and active deception using factored interactive pomdps
A Shinde, P Doshi, O Setayeshfar
Proceedings of the 20th International Conference on Autonomous Agents and …, 2021
Automated software safeness categorization with installation lineage and hybrid information sources
J Rhee, Z Wu, L Korts-Parn, K Jee, LI Zhichun, O Setayeshfar
US Patent 10,929,539, 2021
Privacy invasion via smart-home hub in personal area networks
O Setayeshfar, K Subramani, X Yuan, R Dey, D Hong, IK Kim, KH Lee
Pervasive and Mobile Computing 85, 101675, 2022
Find My Sloths: Automated Comparative Analysis of How Real Enterprise Computers Keep Up with the Software Update Races
O Setayeshfar, JJ Rhee, CH Kim, KH Lee
Detection of Intrusions and Malware, and Vulnerability Assessment: 18th …, 2021
Towards a Non-Discriminatory Security Model Through Analysis of Low Level Data
O Setayeshfar
University of Georgia, 2021
Active Deception using Factored Interactive POMDPs to Recognize Cyber Attacker's Intent
A Shinde, P Doshi, O Setayeshfar
arXiv preprint arXiv:2007.09512, 2020
The system can't perform the operation now. Try again later.
Articles 1–13